How The New World Of Work Will Change Cybersecurity In 2022

Adding Social Media Protection

Bernard Montel, EMEA Technical Director and Cybersecurity Strategist at Tenable shares his predictions for an upcoming year of unrest and uncertainty in the digital ecosystem With growing concerns about the rise in Covid infection rates, particularly around the Omicron variant, the UK Government has mandated businesses to return to the remote working model, where possible. […]

Experts’ Responses Invitation: Cyber Security Forward-Thinking Model


There is a new study called Qualitative Delphi Study: Level of Consensus for a Forward-thinking Cyberterrorism Model that could offer knowledge of the issue of cyberterrorism for the private and public sector, and lead to the criteria for a forward-thinking model according to industry experts. For this study, you are invited to answer a questionnaire about your […]

Penetration Testing

Insider Threats

The goal of a penetration test is to test the security of a computer system by simulating an attack on it. A penetration tester uses the same tools, techniques, and processes as an attacker to detect weaknesses in an organization’s systems and demonstrate their impact. WHAT IS PENETRATION TESTING? It is a type of Security […]

7 Latest Cybersecurity News

In today’s digital age, cybersecurity concerns are on the rise. In 2021, there were around 714 million attempted ransomware assaults recorded, a 134 percent increase over 2020. Criminals are finding new chances to identify easy targets as individuals spend more time online for business creation. Using the correct bait is one of the simplest methods […]

Cryptographic Security And The Quantum Apocalypse

Cybercrime Economics of Malicious Macros

With MI6’s recent admission that it needs to “tap into” the global technology industry to keep up with China’s quantum computing mastery, staying secure against this new computing paradigm is a top priority for world leaders. While many still see quantum computing in the realm of sci-fi, practicable  quantum computing inches closer to becoming a […]

4 Steps To Good Ops Management

Responsibility for Cyber Security

IT operations refers to the set of processes and services that are administered within a larger organisation or business, and operational teams — often more commonly known as “Ops”. IT teams are responsible for making sure these Ops run smoothy throughout an organisation’s system. However, due to lack of time, resources or both, Ops are […]

Mobile Network Vulnerabilities Affecting All Cellular Generations Since 2G

It has been reported that researchers have disclosed security vulnerabilities in handover, a fundamental mechanism that undergirds modern cellular networks, which could be exploited by adversaries to launch denial-of-service (DoS) and man-in-the-middle (MitM) attacks using low-cost equipment. The “vulnerabilities in the handover procedure are not limited to one handover case only but they impact all […]

The Value Of XDR For Cybersecurity Teams

Daniel O’Neill, Director of MDR Security Operations at Bitdefender, argues eXtended detection and response (XDR) can greatly help overstretched and under-resourced Security Operations Center (SOC) teams. By incorporating automation to correlate data from multiple security components, XDR expands visibility and drastically reduces the burden on an organisation. It’s tough being a CISO today. The job […]